(19)
(11) EP 4 542 927 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
23.04.2025 Bulletin 2025/17

(21) Application number: 23203954.5

(22) Date of filing: 17.10.2023
(51) International Patent Classification (IPC): 
H04L 9/40(2022.01)
(52) Cooperative Patent Classification (CPC):
H04L 63/102; H04L 63/0838; G06F 2221/2141; G06F 2221/2149
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC ME MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA
Designated Validation States:
KH MA MD TN

(71) Applicant: Nagravision Sarl
1033 Cheseaux-sur-Lausanne (CH)

(72) Inventors:
  • DYKSTRA-ERICKSON, Elizabeth
    1033 CHESEAUX-SUR-LAUSANNE (CH)
  • BUFFARD, Christophe
    1033 CHESEAUX-SUR-LAUSANNE (CH)
  • BUFFARD, Laura
    1033 CHESEAUX-SUR-LAUSANNE (CH)

(74) Representative: Ipside 
6, Impasse Michel Labrousse
31100 Toulouse
31100 Toulouse (FR)

   


(54) METHOD FOR DEFINING AT LEAST ONE SET OF RULES, METHOD FOR APPLYING A SET OF RULES BY A LAN, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES


(57) A method is proposed for defining, in an authority center, at least one set of rules defining access conditions to internet services for a user terminal. Such method comprises:
- receiving, from a master terminal, the at least one set of rules;
- identifying the user terminal for which the set of rules applies;
- obtaining a unique identifier for said user terminal and a cryptographic function; and
- sending the cryptographic function and the unique identifier to the identified user terminal.
The method additionally comprises:
- receiving a connection request at the communications network from the user terminal;
- receiving, from the user terminal, a one-time identifier generated using a cryptographic function and the unique identifier, the cryptographic function and the unique identifier being known from the authority center;
- transmitting the one-time identifier to the authority center;
- receiving, from the authority center, the set of rules associated to the unique identifier extracted from the one-time identifier;
- applying the set of rules while the user terminal is accessing internet services.




Description

1. FIELD OF THE DISCLOSURE



[0001] The field of the disclosure is that of the control of the access to internet services by a user terminal.

[0002] More specifically, the disclosure relates to a method for such controlling when the user terminal accesses the internet services through a communications network of the local area network (LAN) type, e.g. a Wi-Fi network, an ethernet network, ....

[0003] The disclosure can be of interest in any field wherein such access to internet services through a communications network of the LAN type occurs. This is the case for instance in the context of the connection to hotspots in various areas like school, restaurants, ...

2. TECHNOLOGICAL BACKGROUND



[0004] The access to internet resources can be limited or enabled for a given user terminal (e.g. a smartphone, a computer, a tablet, ...). For instance, parents can set rules to block or control access to services on the internet for the user terminal of their kid. Such rules apply on the LAN of the home, e.g. based on a programming of the home router or gateway. However, in such case the rules apply only locally, when accessing the internet from home, and more particularly from the home LAN.

[0005] Alternatively, some prior art solutions are based on a dedicated Domain Name System (DNS) server. This allows controlling the access even when not at home. However, DNS is only limited to grant or deny access to certain websites. But it fails to define time limits, duration or even actions within a website as can be set at home based on a programming of the home router or gateway.

[0006] There is thus a need for having the rules that have been defined for a user terminal that accesses internet services e.g. through a home router, that still apply while the user terminal goes to another place and accesses internet services through another LAN (e.g. the LAN of a school, of a household or internet cafĂ©, ...). In other words, there is a need for having the rules that have been defined for a user terminal to be portable in the context of roaming from a LAN to another LAN.

[0007] Conversely, in the context of the access to internet services when going through a LAN, the user terminal may remain as not identified by the router or the gateway the user terminal is connected to. For instance, in the context of a WiFi connection, it is known that the Media Access Control (MAC) address can be randomized. This allows in particular avoiding user's tracking. Such respect for privacy is of importance nowadays.

[0008] There is thus a need for having the anonymity of the user terminal to be preserved while having the rules that have been defined for the user terminal to be portable in the context of roaming from a LAN to another LAN.

3. SUMMARY



[0009] A particular aspect of the present disclosure relates to a method for defining, in an authority center, at least one set of rules defining access conditions to internet services for a user terminal. Such method comprises:
  • receiving, from a master terminal, the at least one set of rules;
  • identifying the user terminal for which the set of rules applies;
  • obtaining a unique identifier for said user terminal and a cryptographic function; and
  • sending the cryptographic function and the unique identifier to the identified user terminal.


[0010] Thus, the present disclosure proposes a new and inventive solution for having the anonymity of the user terminal to be preserved while having the rules that have been defined for accessing to the internet to be portable in the context of roaming from a LAN to another LAN (e.g. a Wi-Fi network, a WiMAX network, an ethernet network).

[0011] More particularly, the population of the set(s) of rules in the authority center (e.g. implemented in a remote server communicatively connected to different LANs through the internet) allows the authority center to provide said set(s) of rules to different LANs, thus allowing the portability of said rules. However, the sharing of the cryptographic function and of the unique identifier between the user terminal and the authority center allows the generation of a one-time identifier for requesting one set of rules, e.g. in the context of roaming. This thus preserves the anonymity of the user terminal when accessing the authority center from different communications networks. Indeed, such one-time identifier cannot be decrypted by a device (e.g. a router or a gateway) belonging to a given communications network as the cryptographic function is unknown from such device. The cryptographic function is indeed not populated in any device belonging to the communications network itself. The cryptographic function is rather populated only in the user terminal and in the authority center according to the present method.

[0012] In some embodiments, the user terminal and the master terminal are a same terminal.

[0013] In some embodiments, the user terminal and the master terminal are different terminals. The identifying the user terminal comprises:
  • receiving, from the master terminal, a first identifier associated to the user terminal; and
  • receiving, from the user terminal, a second identifier.


[0014] The sending the cryptographic function and the unique identifier to the user terminal is executed only if the first identifier and the second identifier are a same identifier.

[0015] Another aspect of the present disclosure relates to a method for applying, by a communications network of the LAN type communicatively connected to the internet, a set of rules defining access conditions to the internet services for a user terminal. The set of rules is associated to a unique identifier of the user terminal in an authority center. Such method comprises:
  • receiving a connection request at the communications network from the user terminal;
  • receiving, from the user terminal, a one-time identifier generated using a cryptographic function and the unique identifier, the cryptographic function and the unique identifier being known from the authority center;
  • transmitting the one-time identifier to the authority center;
  • receiving, from the authority center, the set of rules associated to the unique identifier extracted from the one-time identifier;
  • applying the set of rules while the user terminal is accessing internet services.


[0016] Thus, the communications network accesses the rules without having the knowledge of the identity of the user terminal. Indeed, the one-time identifier cannot be decrypted by any device (e.g. a router or a gateway) of the communications network as the cryptographic function is unknown from such device. Such cryptographic function is populated in the user terminal and in the authority center.

[0017] In some embodiments, the method comprises: sending, to the authority center, a profile identifying at least one feature of the communications network. The set of rules is further associated to the profile in the authority center.

[0018] Thus, the set of rules to apply depends on the type of LAN the user device is communicatively connected to. For instance, the rules to apply are different when the user terminal is communicatively connected to a LAN belonging to a school, or to a library or to a restaurant, etc. In this case, the authority center comprises different sets of rules, the selection of the set of rules being dependent of the type of LAN requesting the rules.

[0019] In some embodiments, the method comprises: sending, to a master terminal, a report on the internet services accessed by the user terminal or the type of LAN on which the user terminal has requesting access.

[0020] For instance, parents can be informed of the activity of the terminal equipment of their kids.

[0021] In some embodiments, the set of rules comprises at least one rule belonging to the group comprising:
  • a website that can never be accessed by the user terminal;
  • a website that can always be accessed by the user terminal;
  • a time of day during which the access to internet services is authorized by the user terminal; and
  • a duration of access to internet services for the user terminal.


[0022] Another aspect of the present disclosure relates to a computer program product comprising program code instructions for implementing the above-mentioned method for defining at least one set of rules (in any of the different embodiments discussed above), when said program is executed on a computer or a processor.

[0023] Another aspect of the present disclosure relates to a computer program product comprising program code instructions for implementing the above-mentioned method for applying at least one set of rules (in any of the different embodiments discussed above), when said program is executed on a computer or a processor.

[0024] Another aspect of the present disclosure relates to a first electronic device configured for implementing all or part of the steps of the above-mentioned method for defining at least one set of rules (in any of the different embodiments discussed above). Thus, the features and advantages of this device are the same as those of the corresponding steps of said method. Therefore, they are not detailed any further.

[0025] Another aspect of the present disclosure relates to a server comprising a first electronic device as discussed above (in any of the different embodiments discussed above).

[0026] Another aspect of the present disclosure relates to a second electronic device configured for implementing all or part of the steps of the above-mentioned method for applying at least one set of rules (in any of the different embodiments discussed above). Thus, the features and advantages of this device are the same as those of the corresponding steps of said method. Therefore, they are not detailed any further.

[0027] Another aspect of the present disclosure relates to a router or a gateway comprising a second electronic device as discussed above (in any of the different embodiments discussed above).

4. LIST OF FIGURES



[0028] Other features and advantages of embodiments shall appear from the following description, given by way of indicative and non-exhaustive examples and from the appended drawings, of which:
  • Figure 1 illustrates an authority center communicatively connected to two LANs, a user terminal and a master terminal being connected to one of the LANs, according to one embodiment of the present disclosure;
  • Figure 2 illustrates an example of the structural blocks of an electronic device allowing all or part of the steps of the method of Figure 4 and Figure 4a to be executed by the authority center of Figure 1;
  • Figure 3 illustrates an example of the structural blocks of an electronic device allowing all or part of the steps of the method of Figure 5 to be executed by the LANs of Figure 1;
  • Figure 4 illustrates the steps of a method for defining at least one set of rules according to one embodiment of the present disclosure;
  • Figure 4a illustrates the steps executed during the step of identification of the user terminal of the method of Figure 4 according to one embodiment of the present disclosure; and
  • Figure 5 illustrates the steps of a method for applying, by a LAN, a set of rules according to one embodiment of the present disclosure.

5. DETAILED DESCRIPTION



[0029] In all of the Figures of the present document, the same numerical reference signs designate similar elements and steps.

[0030] Referring now to Figure 1, we describe an authority center 190 communicatively connected to two LANs 101, 102, a user terminal 110 (e.g. a smartphone, a tablet or a personal computer equipped with a wireless communications module, ...) and a master terminal 130 (e.g. a smartphone, a tablet or a personal computer equipped with a wireless communications module, ...) being connected to one of the LANs 101, 102 according to one embodiment of the present disclosure.

[0031] More particularly, the authority center 190 (e.g. implemented in a server) is communicatively connected to the two LANs 101, 102 going through a communications network 150. For instance, the communications network 150 implements wired connections, e.g. of a xDSL type. Such connections implement for instance an internet protocol. However, in some embodiments, the communications network 150 implements wireless communications links, e.g. based on a cellular protocol (e.g. a 3GPP 2G, 3G, 4G or 5G protocol).

[0032] Back to Figure 1, the first LAN 101 and the second LAN 102 are wireless LANs, e.g. a Wi-Fi network or a WiMAX network. The user terminal 110 and the master terminal 130 are communicatively connected to a gateway 121 of the first LAN 101. In other embodiments, the user terminal 110 and/or the master terminal 130 are communicatively connected to a router of the first LAN 101. In some embodiments, the first LAN 101 and/or the second LAN are LANs implementing wired communication links, e.g. based on an ethernet protocol.

[0033] Back to Figure 1, the master terminal 130 allows defining set(s) of rules in the authority center 190 according to the method disclosed below in relation with Figure 4 and Figure 4a. More particularly, such rules define access conditions to internet services for the user terminal 110. For instance, such rules belong to the group comprising:
  • a website that can never be accessed by the user terminal 110;
  • a website that can always be accessed by the user terminal 110;
  • a time of day during which the access to internet services is authorized by the user terminal 110; and
  • a duration of access to internet services for the user terminal 110.


[0034] Back to Figure 1, the master terminal 130 sends the set of rules to the authority center 190. Conversely, the authority center 190 receives and stores the set of rules sent by the master terminal 130. This allows the authority center 190 to provide the set of rules to a LAN, e.g. the first LAN 101, following the method disclosed below in relation with Figure 5 for having the LAN to apply the set of rules while the user terminal 110 is accessing internet services.

[0035] In some embodiments, the master terminal 130 does not send the set of rules to the authority center 190 going through a LAN 101. Indeed, according to the present technic, only the application of the rules involves a LAN 101 or 102. Consequently, in some embodiments, the sending of the rules by the master terminal 130 to the authority center 190 and/or the sending of the cryptographic function and the unique identifier to the user terminal 110 (method of Figure 4 and Figure 4a) does not go through a LAN (e.g. the first LAN 101), but rather involves only a communications network which is not of the LAN type, e.g. such as the communications network 150.

[0036] In some embodiments, the master terminal 130 and the user terminal 110 are a same terminal equipment.

[0037] In order to be able to execute the steps of the method for defining at least one set of rules disclosed below in relation with Figure 4 and Figure 4a, the authority center 190 comprises an electronic device 190d comprising means configured for executing said method. More particularly, in some embodiments the device 190d comprises (Figure 2):
  • a non-volatile memory 203 (e.g. a read-only memory (ROM), a hard disk, a flash memory, etc.);
  • a volatile memory 201 (e.g. a random-access memory or RAM) and a processor 202.


[0038] The non-volatile memory 203 is a non-transitory computer-readable carrier medium. It stores executable program code instructions, which are executed by the processor 202 in order to enable implementation of some steps of the method described below (method for defining at least one set of rules) in the various embodiments disclosed below in relationship with Figure 4 and Figure 4a.

[0039] Upon initialization, the aforementioned program code instructions are transferred from the non-volatile memory 203 to the volatile memory 201 so as to be executed by the processor 202. The volatile memory 201 likewise includes registers for storing the variables and parameters required for this execution.

[0040] The steps of the method for defining at least one set of rules may be implemented equally well:
  • by the execution of a set of program code instructions executed by a reprogrammable computing machine such as a PC type apparatus, a DSP (digital signal processor) or a microcontroller. This program code instructions can be stored in a non-transitory computer-readable carrier medium that is detachable (for example a CD-ROM, a DVD-ROM, a USB key) or non-detachable; or
  • by a dedicated machine or component, such as an FPGA (Field Programmable Gate Array), an ASIC (Application-Specific Integrated Circuit) or any dedicated hardware component.


[0041] In other words, the disclosure is not limited to a purely software-based implementation, in the form of computer program instructions, but that it may also be implemented in hardware form or any form combining a hardware portion and a software portion.

[0042] In order to be able to execute the steps of the method for applying a set of rules disclosed below in relation with Figure 5, the gateway 121, 122 comprises an electronic device 120d comprising means configured for executing said method. More particularly, in some embodiments the device 120d comprises (Figure 3):
  • a non-volatile memory 303 (e.g. a read-only memory (ROM), a hard disk, a flash memory, etc.);
  • a volatile memory 301 (e.g. a random-access memory or RAM) and a processor 302.


[0043] The non-volatile memory 303 is a non-transitory computer-readable carrier medium. It stores executable program code instructions, which are executed by the processor 302 in order to enable implementation of some steps of the method described below (method for applying a set of rules) in the various embodiments disclosed below in relationship with Figure 5.

[0044] Upon initialization, the aforementioned program code instructions are transferred from the non-volatile memory 303 to the volatile memory 301 so as to be executed by the processor 302. The volatile memory 301 likewise includes registers for storing the variables and parameters required for this execution.

[0045] The steps of the method for applying a set of rules may be implemented equally well:
  • by the execution of a set of program code instructions executed by a reprogrammable computing machine such as a PC type apparatus, a DSP (digital signal processor) or a microcontroller. This program code instructions can be stored in a non-transitory computer-readable carrier medium that is detachable (for example a CD-ROM, a DVD-ROM, a USB key) or non-detachable; or
  • by a dedicated machine or component, such as an FPGA (Field Programmable Gate Array), an ASIC (Application-Specific Integrated Circuit) or any dedicated hardware component.


[0046] In other words, the disclosure is not limited to a purely software-based implementation, in the form of computer program instructions, but that it may also be implemented in hardware form or any form combining a hardware portion and a software portion.

[0047] In some embodiments, the electronic device 120d is implemented in a router of a LAN.

[0048] Referring now to Figure 4, we describe a method for defining at least one set of rules according to one embodiment of the present disclosure.

[0049] More particularly, in a step S400, the authority center 190 receives, from the master terminal 130, a set of rules. Conversely, during step S400, the master terminal 130 sends the set of rules to the authority center 190. In an embodiment, a selection of set of rules are available at the authority center 190 and the master terminal 130 selects one set of rules to be applied for the user terminal 110. As discussed above in relation with Figure 1, such rule defines access conditions to internet services for the user terminal 110. For instance, the rules are defined by a user of the master terminal 130 through a dedicated application running on the master terminal 130.

[0050] In some embodiments, the authority center 190 receives, from the master terminal 130, different sets of rules. For instance, the different sets of rules can be defined depending on the type of LAN the user terminal 110 is expected to connect to. For instance, the rules to apply are different when the user terminal 110 is communicatively connected to a LAN belonging to a school, or to a library or to a restaurant, etc.

[0051] Back to Figure 4, in a step S410, the authority center 190 identifies the user terminal 110 for which the set of rules received during the step S400 apply.

[0052] In a step S420, the authority center 190 obtains a unique identifier for the user terminal 110 identified during step S410, as well as a cryptographic function. For instance, in some implementations, the authority center 190 generates the unique identifier and the cryptographic function. In other implementations, different couples of unique identifiers and associated cryptographic functions are prestored in the authority center 190. In this case, the authority center 190 selects (e.g. randomly) the unique identifier and the cryptographic function among the prestored couples.

[0053] Back to Figure 4, in a step S430, the authority center 190 sends the cryptographic function and the unique identifier obtained during step S420 to the user terminal 110 identified during step S410.

[0054] Thus, the population of the set(s) of rules in the authority center 190 (e.g. implemented in a server communicatively connected to different LANs 101, 102 through the internet as discussed above in relation with Figure 1) allows the authority center 190 to provide said set(s) of rules to different LANs 101, 102 thus allowing the portability of said rules.

[0055] In embodiments discussed above in relation with Figure 1 wherein the user terminal 110 and the master terminal 130 are a same terminal equipment, during the step S410, the authority center 190 identifies directly the user terminal 110 it is connected to (e.g. through identification information provided by the user terminal 110 when establishing the connection). In this example, the transmission of the cryptographic function is executed during the set-up phase of the set of rules.

[0056] Conversely, in the embodiment of Figure 4a, the user terminal 110 and the master terminal 130 are assumed to be different terminals. Thus, during the step S410, the authority center 190 executes:
  • a step S410a wherein the authority center 190 receives, from the master terminal 130, a first identifier associated to the user terminal 110; and
  • a step S410b wherein the authority center 190 receives, from the user terminal 110, a second identifier.


[0057] In this case, the step S430 is thus executed only if the first identifier and the second identifier are a same identifier. For instance, the first identifier and the second identifier are the same identifier which is prestored in the master terminal 130 and the user terminal 110. This results e.g. from a pairing between the master terminal 130 and the user terminal 110. In this example, to complete the set-up phase, the user terminal 110 is required to connect with the authority center 190 and transmit its identifier (the second identifier). The authority center 190 scans its database to check if a first identifier matching the second identifier is present and in the positive event, transmits the cryptographic function related to the user terminal 110.

[0058] Referring now to Figure 5, we describe a method for applying, by a LAN 101, 102 a set of rules according to one embodiment of the present disclosure. As discussed above, such rules define access conditions to the internet services for the user terminal 110. The set of rules is associated to a unique identifier of the user terminal 110 in the authority center 190.

[0059] More particularly, in a step S500, the gateway 121 receives a connection request from the user terminal 110.

[0060] This corresponds to the configuration of Figure 1, taken as an illustrative example in the sequel, wherein the user terminal 110 is communicatively connected to the first LAN 101. However, in other cases, e.g. during the roaming of the user terminal 110 from the first LAN 101 toward the second LAN 102, this is the gateway 122 that receives a connection request from the user terminal 110.

[0061] Back to Figure 5, in a step S510, the gateway 121 receives from the user terminal 110, a one-time identifier generated using a cryptographic function and the unique identifier.

[0062] For instance, the cryptographic function and the unique identifier have been populated by the authority center 190 in the user terminal 110 by execution of the method for defining at least one set of rules discussed above in relation with Figure 4 and Figure 4a (in any of the embodiments discussed above in relation with Figure 4 and Figure 4a). Alternatively, the cryptographic function and the unique identifier have been prestored both in the user terminal 110 and in the authority center 190 during a pairing phase, or during manufacturing.

[0063] Back to Figure 5, in a step S520, the gateway 121 transmits the one-time identifier to the authority center 190.

[0064] In a step S530, the gateway 121 receives, from the authority center 190, the set of rules associated to the unique identifier extracted from the one-time identifier.

[0065] Indeed, as discussed above, the cryptographic function and the unique identifier are known from the authority center 190 so that the authority center 190 can decrypt the one-time identifier and extract the unique identifier.

[0066] For instance, the one-time identifier has been generated by the user terminal 110 as the result of the cryptographic function taking as argument the concatenation of the unique identifier and of a random number. In this case, the authority center 190 decrypts the one-time identifier based on the cryptographic function, resulting in the concatenation of the unique identifier and of a random number. By discarding the random number part, the authority center 190 obtains the unique identifier. This unique identifier is used to determine which user terminal is requesting the access to internet services and which set of rules should be applied for the gateway.

[0067] The random number can be replaced by a time stamp. The time stamp is a transient value that change over time. This has the further advantage to avoid replaying the one-time identifier since the authority center 190 will only accept fresh timestamps. The authority center 190 can determine a window during which the timestamp is accepted, for example 10 seconds. In case that the timestamp exhibits an older time, the one-time identifier is discarded.

[0068] Back to Figure 5, in a step S540, the gateway 121 applies the set of rules while the user terminal 110 is accessing internet services. The access to internet services by the user terminal 110 is thus controlled by the gateway 121 itself.

[0069] According to the present method, the LAN 101 accesses the rules without having the knowledge of the identity of the user terminal 110. Indeed, the one-time identifier cannot be decrypted by any device (e.g. a router or the gateway 121) of the LAN 101 as the cryptographic function is unknown from such device. Such cryptographic function is populated only in the user terminal 110 and in the authority center 190, and not in any device belonging to the LAN 101 itself. This thus preserves the anonymity of the user terminal 110 when accessing the authority center 190 from different LANs 101, 102.

[0070] In some embodiments, the gateway 121 or 122 the user terminal 110 is connected to sends, to the authority center 190, a profile identifying at least one feature of the LAN 101 or 102. In some of those embodiments, the authority center, after having determined which user terminal 110 is requesting the access, can further select the set of rules dedicated to this type of LAN 101 or 103, using the profile of the gateway 121 or 122 as selection criteria. The set of rules received during the execution of the step S530 is then associated with the user terminal 110 and the profile of the gateway 121 or 122.

[0071] Thus, the set of rules to apply depends on the type of LAN 101 or 102 the user device 110 is communicatively connected to. For instance, the rules to apply are different when the user terminal 110 is communicatively connected to a LAN 101 or 102 belonging to a school, or to a library or to a restaurant, etc.

[0072] In some embodiments, the gateway 121 or 122 the user terminal 110 is connected to sends, to the master terminal 130, a report on the user terminal activity related to internet services. For instance, parents can thus be informed of the activity of the terminal equipment 110 of their kids by receiving a notification identifying the type of LAN (gateway) for which a request for connection was executed by the user terminal or the internet services requested by the user terminal.

[0073] In some embodiments discussed above in relation with Figure 1, the device 120d is implemented in a router of the LAN 101 or 102 rather than in a gateway 121 or 122. In such cases, the method of Figure 5 (in any of the embodiments discussed above in relation with Figure 5) is executed by such router. However, in any case the method of Figure 5 (in any of the embodiments discussed above in relation with Figure 5) is executed by a communications network 101, 102 of the LAN type communicatively connected to the internet.

[0074] In one embodiment, the cryptographic function comprises a cryptographic engine implementing an asymmetric algorithm (such as RSA) associated with a cryptographic keypair. The cryptographic engine is common to all user terminals 110 and the cryptographic key is the public key of the authority center 190. Loading the cryptographic function is this case means loading the public cryptographic key pertaining to said authority center 190. At the reception of the one-time identifier, the private key of the public/private key pair is used to decrypt the one-time identifier and then the authority center 190 can extract the unique identifier of the user terminal 110.


Claims

1. Method for defining, in an authority center (190), at least one set of rules defining access conditions to internet services for a user terminal (110),
characterized in that the method comprises:

- receiving (S400), from a master terminal (130), the at least one set of rules;

- identifying (S410) the user terminal for which the set of rules applies;

- obtaining (S420) a unique identifier for said user terminal and a cryptographic function; and

- sending (S430) the unique identifier and the cryptographic function to the identified user terminal.


 
2. Method according to claim 1, wherein the user terminal and the master terminal are a same terminal.
 
3. Method according to claim 1, wherein the user terminal and the master terminal are different terminals,

and wherein the identifying (S410) the user terminal comprises:

- receiving (S410a), from the master terminal, a first identifier associated to the user terminal; and

- receiving (S410b), from the user terminal, a second identifier,

wherein said sending the cryptographic function and the unique identifier to the user terminal is executed only if the first identifier and the second identifier are a same identifier.


 
4. Method for applying, by a communications network (101, 102) of the LAN type communicatively connected to the internet, a set of rules defining access conditions to the internet services for a user terminal (110), the set of rules being associated to a unique identifier of the user terminal in an authority center (190),
characterized in that the method comprises:

- receiving (S500) a connection request at the communications network (102) from the user terminal (110);

- receiving (S510), from the user terminal, a one-time identifier generated using a cryptographic function and the unique identifier, the cryptographic function being known from the authority center;

- transmitting (S520) the one-time identifier to the authority center;

- receiving (S530), from the authority center, the set of rules associated to the unique identifier extracted from the one-time identifier; and

- applying (S540) the set of rules while the user terminal is accessing internet services.


 
5. Method according to claim 4, comprising:

- sending, to the authority center, a profile identifying at least one feature of the communications network,

wherein the set of rules is further associated to the profile in the authority center.
 
6. Method according to claim 4 or 5, comprising:

- sending, to a master terminal, a report on the internet services accessed by the user terminal.


 
7. Method according to any of the claims 1 to 6, wherein the set of rules comprises at least one rule belonging to the group comprising:

- a website that can never be accessed by the user terminal;

- a website that can always be accessed by the user terminal;

- a time of day during which the access to internet services is authorized by the user terminal; and

- a duration of access to internet services for the user terminal.


 
8. Computer program product characterized in that it comprises program code instructions for implementing a method according to any of the claims 1 to 7.
 
9. Electronic device (190d) for defining, at least one set of rules defining access conditions to internet services for a user terminal (110),
characterized in that it comprises a processor (202) or a dedicated computing machine configured for:

- receiving (S400), from a master terminal (130), the at least one set of rules;

- identifying (S410) the user terminal for which the set of rules applies;

- obtaining (S420) a unique identifier for said user terminal and a cryptographic function; and

- sending (S430) the unique identifier and the cryptographic function to the identified user terminal.


 
10. Electronic device (120d) for applying, by a communications network (101, 102) of the LAN type communicatively connected to the internet, a set of rules defining access conditions to the internet services for a user terminal (110), the set of rules being associated to a unique identifier of the user terminal in an authority center (190), characterized in that it comprises a processor (202) or a dedicated computing machine configured for:

- receiving (S500) a connection request at the communications network (102) from the user terminal (110);

- receiving (S510), from the user terminal, a one-time identifier generated using a cryptographic function and the unique identifier, the cryptographic function and the unique identifier being known from the authority center;

- transmitting (S520) the one-time identifier to the authority center;

- receiving (S530), from the authority center, the set of rules associated to the unique identifier extracted from the one-time identifier; and

- applying (S540) the set of rules while the user terminal is accessing internet services.


 
11. Server (190) comprising an electronic device (190d) according to claim 9.
 
12. Router or gateway (121, 122) comprising an electronic device (120d) according to claim 10.
 




Drawing










Search report









Search report